Sign of the Times: 'Nice' Biometrics

January 2009
Security: Solutions for Enterprise Security Leaders;Jan2009, Vol. 46 Issue 1, p14
Trade Publication
The article presents statistics related to biometrics.


Related Articles

  • Reference Threshold Calculation for Biometric Authentication. Malik, Jyoti; Girdhar, Dhiraj; Dahiya, Ratna; Sainarayanan, G. // International Journal of Image, Graphics & Signal Processing;Jan2014, Vol. 6 Issue 2, p46 

    In biometric systems, reference threshold is defined as a value that can decide the authenticity of a person. Authenticity means whether the person is genuine or intruder. The statistical calculation of various values like reference threshold, FAR (False Acceptance Rate), FRR (False Rejection...

  • Fusion of Face and Voice: An improvement. Fouda, Y. M. // International Journal of Computer Science & Network Security;Apr2012, Vol. 12 Issue 4, p37 

    Multimodal biometric systems provide a better recognition performance compared to systems based on a single biometric modality. The fusion technique is necessary and effective for combing information in multimodal biometric system. In this paper, we propose a new fusion technique based on simple...

  • Localization and Extraction of Iris Effective Region for IRIS Recognition. Eun-suk Cho; Gelogo, Yvette; Seok-soo Kim // Journal of Security Engineering;Aug2011, Vol. 8 Issue 4, p467 

    Iris recognition has many advantages over other forms of biometric identification. The study for human iris recently has attracted the attention of biometrics-based identification and verification research and development institutions. In this paper we propose a new biometric-based Iris...

  • An Overview of the Information-Theoretic Perspectives on Biometric Systems. Yanling Chen; Han Vinck, A. J.; Gligoroski, Danilo; Knapskog, Svein J. // Norwegian Information Security Conference / Norsk Informasjonssi;Nov2011, Issue 21-23, p31 

    In this paper, we give an overview of the information-theoretic perspectives on the newly emerging biometric-based authentication/identification systems, which include perspectives of Shannon's communication channel, Shannon's secrecy system, common randomness of correlated variables, Wyner's...

  • Untapped Fingerprint Matching Using Advanced Features. Sundarraj, B. // Middle East Journal of Scientific Research;1/11/2014, Vol. 19 Issue 6, p826 

    Latent Fingerprint Identification is of critical importance to law enforcement agencies in identifying suspects. Latent Fingerprints are inadvertent impressions left by fingers on surfaces of object. While tremendous progress has been made in plain and rolled fingerprint matching, latent...

  • Reverse Authentication in Financial Transactions and Identity Management. Chen, Bangdao; Nguyen, Long; Roscoe, A. // Mobile Networks & Applications;Oct2013, Vol. 18 Issue 5, p712 

    New families of protocol, based on communication over human-based side channels, permit secure pairing or group formation in ways such that no party has to prove its name. Rather, individuals are able to hook up devices in their possession to others that they can identify by context. We examine...

  • Beyond the individuality of fingerprints: a measure of simulated computer latent print source attribution accuracy. Cole, Simon A.; Welling, Max; Dioso-Villa, Rachel; Carpenter, Robert // Law, Probability & Risk;Sep2008, Vol. 7 Issue 3, p165 

    Efforts to harness computer fingerprint databases to perform studies relevant to fingerprint identification have tended to focus on 10-print, rather than latent print, identification or on the inherent individuality of fingerprint images. This paper reports on three experiments that measure the...

  • Personal Identification by Eyes. Marinović, Dunja; Njirić, Sanja; Čoklo, Miran; Mužić, Vedrana // Collegium Antropologicum;Jun2011 Supplement, Vol. 35, p347 

    Identification of persons through the eyes is in the field of biometrical science. Many security systems are based on biometric methods of personal identification, to determine whether a person is presenting itself truly. The human eye contains an extremely large number of individual...

  • Amended Biometric Authentication using Secret Sharing. Sirdeshpande, Janhavi; Patil, Sonali // International Journal of Computer Applications;Jul2014, Vol. 98, p1 

    Visual cryptography is a secret sharing scheme where a secret image gets divided into number of pieces called shares and not a single share disclose any information about secret image. There are some automated methods to identify and verify the user based on the physiological characteristics. To...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics